{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T09:59:52Z","timestamp":1771667992380,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540546207","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_16","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"176-185","source":"Crossref","is-referenced-by-count":65,"title":["On A Fast Correlation Attack on Certain Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Chepyzhov","sequence":"first","affiliation":[]},{"given":"Ben","family":"Smeets","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"C-34","author":"T. Siegenthaler","year":"1985","unstructured":"T. Siegenthaler, \u201cDecrypting a class of stream ciphers using ciphertext only\u201d, IEEE Trans. Comput., Vol. C-34, 1985, pp. 81\u201385.","journal-title":"IEEE Trans. Comput."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"W. Meier, and O. Staffelbach, \u201cFast correlation attacks on certain stream ciphers\u201d, J. Cryptology, 1989, pp. 159\u2013176.","DOI":"10.1007\/BF02252874"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"M. Mihaljevic, and J. Golic, \u201cA fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence\u201d, Proc. Auscrypt 1990, pp. 165\u2013175.","DOI":"10.1007\/BFb0030359"},{"key":"16_CR4","first-page":"3","volume":"19","author":"G. S. Evseev","year":"1983","unstructured":"G. S. Evseev, \u201cComplexity of decoding for linear codes\u201d, Probl. Peredach. Inform., Vol. 19, 1983, pp. 3\u20138.","journal-title":"Probl. Peredach. Inform."},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1109\/18.57202","volume":"IT-36","author":"J. T. Coffey","year":"1990","unstructured":"J. T. Coffey, and R. M. Goodman, \u201cThe complexity of information set decoding\u201d, IEEE Trans. Inform. Theory, Vol. IT-36, 1990, pp. 1031\u20131037.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"16_CR6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low-Density Parity-Check Codes","author":"R. G. Gallager","year":"1963","unstructured":"R. G. Gallager, Low-Density Parity-Check Codes, MIT Press, Cambridge, MA, 1963."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:21Z","timestamp":1605629481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_16","relation":{},"subject":[]}}